Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
eavesdropping
biblio
Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors
Submitted by aekwall on Wed, 02/13/2019 - 12:02pm
Scalability
eavesdropping
Electromagnetic Side-Channels
software defined radio
Unintentional Hardware Emissions
Resiliency
Human behavior
Attack vectors
pubcrawl
biblio
Optical Wireless Interception Vulnerability Analysis of Visible Light Communication System
Submitted by grigby1 on Mon, 01/21/2019 - 12:20pm
eavesdropping
Visible Light Communications Security
visible light communication system
signal to noise ratio threshold
Receivers
receiver aperture
optical wireless interception vulnerability analysis
optical links
modulation
lighting
indoor communication performance
indoor communication
security
Data Transmission
data communication
Apertures
optical communication
light emitting diodes
Signal to noise ratio
telecommunication security
Scalability
Resiliency
Metrics
pubcrawl
biblio
On modeling of eavesdropping behavior in underwater acoustic sensor networks
Submitted by K_Hooper on Wed, 04/04/2018 - 9:51am
security
wireless sensor networks
Wind speed
Underwater Networks
Underwater acoustics
underwater acoustic sensor networks
underwater acoustic communication
underwater acoustic channel characteristics
underwater
telecommunication security
spreading factor
Sonar equipment
simulation
Signal to noise ratio
acoustic communication
Scalability
Resiliency
pubcrawl
probability
Metrics
isotropic hydrophones
hydrophones
eavesdropping probability
eavesdropping
Computational modeling
array hydrophones
acoustic signal frequency
biblio
Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework
Submitted by grigby1 on Mon, 03/19/2018 - 2:00pm
jamming detection
Wireless communication
Stochastic processes
stochastic games
secret communication
Scalability
Resiliency
resilience
reliable wireless communication
Reliability
pubcrawl
physical layer security
Metrics
legitimate transmission link
Adversary Models
jamming attack
Jamming
intrusion detection system
Human behavior
Games
game theory
game theoretical framework
Eavesdropping detection
eavesdropping
dual detection techniques
computer network security
Communication system security
biblio
LuxLeak: Capturing Computing Activity Using Smart Device Ambient Light Sensors
Submitted by grigby1 on Tue, 09/19/2017 - 12:08pm
ambient light sensor
eavesdropping
Human behavior
keystroke analysis
lux
Metrics
mobile malware
Mobile Security
privacy
pubcrawl
screen emanations
side-channel analysis
smart phone
smart watch
wearable computing
biblio
WritingHacker: Audio Based Eavesdropping of Handwriting via Mobile Devices
Submitted by grigby1 on Tue, 09/05/2017 - 1:50pm
audio signals
composability
digital signal processing
eavesdropping
handwriting
Metrics
privacy
pubcrawl
Resiliency
signal processing security
biblio
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet
Submitted by grigby1 on Tue, 09/05/2017 - 1:50pm
attack
composability
digital signal processing
eavesdropping
Ethernet
FPGA
Metrics
privacy
pubcrawl
Resiliency
signal processing
signal processing security
tempest
biblio
A Secure Protocol for Trust Management in OLSR
Submitted by grigby1 on Wed, 08/02/2017 - 1:40pm
advanced encryption standard
detection
Digest
digital signature
eavesdropping
manet attack prevention
Multipoint Relay
pubcrawl
biblio
Exposing Transmitters in Mobile Multi-Agent Games
Submitted by grigby1 on Fri, 05/19/2017 - 1:58pm
Compositionality
CPS modeling
eavesdropping
game of eves
Human behavior
location privacy
Metrics
pubcrawl
pursuit-evasion
Resiliency
Security games
simulation
wireless networks
biblio
That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing Mechanisms
Submitted by grigby1 on Mon, 04/24/2017 - 11:39am
anonymity
anonymity in wireless networks
Browser Security
composability
eavesdropping
HTTP strict transport security
HTTPs
HTTPs everywhere
Human behavior
Metrics
privacy
pubcrawl
Resiliency
web security
« first
‹ previous
1
2
3
4
next ›
last »